irmadlad

joined 2 weeks ago
[–] irmadlad@lemmy.world 7 points 19 hours ago

Dude. Awesome blog.

[–] irmadlad@lemmy.world 8 points 20 hours ago

Ok my brother, I'm back with great news. It is as easy as everyone in this thread has said it was. Honestly, it wasn't the set up that I was concerned with. My question was more concerned with any additional security considerations I may have to deploy before setting Tailscale up as an exit node and thus using it as a traditional VPN.

First, I am going to assume you already have Tailscale deployed on your server & laptop or desktop. That's going to make it a lot easier....hurr hurr.

So fire up your terminal and point it at your server. You can run sudo tailscale status to check the current status of Tailscale. After which you will need to issue this command: tailscale up --advertise-exit-node. This does what it says and tells Tailscale to use the current server as an exit node.

Having done that, in the Tailscale console online click the [Machines] tab. Click the [...] option at the far right of your server listing and select [Edit Route Settings]. This brings up a dialogue box. Check [Use As Exit Node].

Assuming a Windows laptop/desktop, click the Tailscale tray icon. You should see your server listed under [Recommended]. Choose that one.

You should now be connected to the server exit node. Check your IP Check your speed. Not too shabby. Conduct a DNS Leak Check

There you go. Jack's a doughnut, Bob's your uncle. To put your server back, use sudo tailscale up --advertise-exit-node=false

Somebody fact check me. LOL

[–] irmadlad@lemmy.world 6 points 1 day ago

How about I do the set up first, take my normal notes as I do, and then report back to you. That way I'll have a firmer grip on what needs to be done.

[–] irmadlad@lemmy.world 1 points 1 day ago (1 children)

Nah, it's good. I do have a knack for asking silly, basic questions. I certainly don't have the networking prowess and certifications that some of the group here has, and I just want to be cautious, perhaps overly cautious when implementing what I have proposed. I know what an overlay vpn does, and I know what a traditional vpn like say, PIA, does. I just want to proceed with caution because the end use has serious implications if improperly deployed. At the very least I want to make myself confidant that I have covered all bases.

[–] irmadlad@lemmy.world 1 points 1 day ago (3 children)

I'm sorry...I'm just asking all the stupid questions up front.

 

I am toying with the idea of using one of my Tailscale instances as traditional VPN, using the exit node features. I think I have that part down to a note as far as what has to be done in order for this to happen.

My question is if there are any security risks or security provisions that need to be made to keep the envelope secure. I am the only user of my Tailscale network, so I don't have to worry about another user jacking things up. However, I am concerned about the implications of the visibility of the exit node I would be connecting to.

[–] irmadlad@lemmy.world 1 points 1 day ago

I run a hybrid: 3 VPS and a rack in the closet. I don't get hung up about labels. I leave that to others who obsess about that sort of stuff.

[–] irmadlad@lemmy.world 2 points 2 days ago (1 children)

sugar_in_your_tea @sh.itjust.works

It's nice to be commented by someone famous.

Open up the window, let some air into this room I think I'm almost chokin' from the smell of stale perfume And that cigarette you're smokin' 'bout scare me half to death Open up the window, sucker, let me catch my breath

[–] irmadlad@lemmy.world 1 points 2 days ago

I have tried on numerous occasions to get freedns.afraid.org to work for me. I would be interested in how you got it going when you do get it all worked out.

[–] irmadlad@lemmy.world 2 points 2 days ago

I worry that having to maintain a VPS myself is tedious and risky

I have three VPS, and a rack in the closet. As far as maintenance is concerned, once you get everything set up and secured, there's not a whole lot to 'maintain', imho. I check logs, make sure all the baddies are at bay and all my good stuff is secured. I leverage technology to help me. I get a summary in the morning telling me all services are up. I do that with n8n, but you certainly could put together something more than my basic n8n flow. I use Docker containers a lot, so I have dockerbot to check that all services are up and running. Dockerbot allows me to stop/start/restart containers. I use UptimeKuma to also keep track of services and send me updates, and I use the iOS app for UptimeKuma which has a handy widget.

Once a month I run sudo apt update / sudo apt full-upgrade to make sure everything is updated. NBD there if you do it regularly and don't skip a lot of updates/upgrades. Backups happen every night using the 3,2,1 method and backed up to an offsite facility. I have a bot that at regular intervals during the day, issue sudo lsof -nP -iTCP -sTCP:ESTABLISHED and several other commands to the servers and reports back.

All of this may sound like a lot, but really once you get everything grooving, it's jippity jippity. I do business with:

  • Contabo
  • Ethernet Services
  • LuxVPS

One thing I've learned through the years is that one man's dream VPS service, is another man's nightmare VPS service. Making recommendations is kind of hit and miss for this reason.

[–] irmadlad@lemmy.world 5 points 2 days ago

Picked up the story a while back. See, it would not do me good to have this happen to me. If I were forced to rename it, it would be the most deliberate, yet creative, slur against the other product.

[–] irmadlad@lemmy.world 3 points 2 days ago

+1 for Crowdsec

[–] irmadlad@lemmy.world 20 points 2 days ago* (last edited 2 days ago) (4 children)

OP, here is what I do. It might seem overboard, and my way doesn't make it the best, or the most right, but it seems to work for me:

  • Fail2ban
  • UFW
  • Reverse Proxy
  • IPtraf (monitor)
  • Lynis (Audit)
  • OpenVas (Audit)
  • Nessus (Audit)
  • Non standard SSH port
  • CrowdSec + Appsec
  • No root logins
  • SSH keys
  • Tailscale
  • RKHunter

The auditing packages, like Lynis, will scour your server, and make suggestions as to how to further harden your server. Crowdsec is very handy in that it covers a lot of 'stuff'. It's not the only WAF around. There is Wazuh, Bunkerweb, etc. Lots of other great comments here with great suggestions. I tend to go overboard on security because I do not like mopping up the mess after a breach.

ETA: just looked up one of your attackers:

218.92.0.201 was found in our database! This IP was reported 64,044 times. Confidence of Abuse is 100%: ISP CHINANET jiangsu province network Usage Type Fixed Line ISP ASN AS4134 Domain Name chinatelecom.cn Country China City Shanghai, Shanghai

busy little cunts.

 

So, I run three VPS and one rack in the closet. Currently I have Duplicati running on all four servers. What I would like to do is have one central server back up all four servers and store the backups in an offsite repository.

I'd prefer something with a good GUI. I know you purist get a hard on thinking about the CLI, and while it is a very powerful aspect of Linux, I still like a GUI.

What are my options?

Side note, I wanted to look at Bacula but their site seems nonexistent. Is Bacula defunct?

97
submitted 1 week ago* (last edited 1 week ago) by irmadlad@lemmy.world to c/selfhosted@lemmy.world
 

I'm sure everyone is aware of the 'Awesome' lists on Github. There are loads of them, which makes keeping up with new apps a chore.

I came across this site that does that very thing:

https://www.trackawesomelist.com/

I didn't know if anybody would find it as useful as I do. I have it in my FreshRSS reader.

 

i r mad lad. I am a musician of mediocre talent, and a technology enthusiast. I self host most of the services I use on a daily basis. I am a staunch privacy advocate. For someone in my geriatric, boomer group, I don't fear technology, I embrace it knowing that technology can be a double edged sword, depending on how it's used...so we must use it wisely.

I've known about Lemmy, Mastadon, Matrix etc, for some time now, but decided that I would try it out after really becoming disenchanted with Reddit. So, here I am.

Where is a good place on Lemmy where one can rub elbows with other musicians? I've already found the SelfHost section and am now looking for producers both professional, and hobbyist like myself.

Regards

82
ISO Selfhost (lemmy.world)
submitted 1 week ago* (last edited 1 week ago) by irmadlad@lemmy.world to c/selfhosted@lemmy.world
 

I've been into computers since around the mid 70s. First one was an Altair 8000. I have been selfhosting for years now, self taught and helped along of course by the selfhosting communities.

Not to speak bad of the dead, but I've really had it up to my back teeth with their bullshit. So I am in search of some self hosting brethren to chum around with. I figured I'd give Lemmy a try. It's kind of confusing, but hopefully I can wrap my 70 year old head around it.

I've seen a few selfhost forum around the fediverse but they all seem to have been abandoned with threads a year or more old, and no movement. So my question, is there a thriving selfhost/homelab type place that is active? Perhaps one of you good souls could point me in the right direction.

Is there any benefit to hosting your own Lemmy and mesh it with the other Lemmey's out there? What benefit would that be? From what I understand, hosting your own instance turns out to just be your own personal blog.

I mean, I understand the fediverse, and decentralization, I'm just having a bit of difficulty getting in with the right, active, group.

TIA

ETA: Thank you for the very warm welcome. Hopefully I will be turtley enough for the turtle club.

view more: next ›